<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T09:49:02.864450+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/a9c74ca4-1056-4ab5-b8b3-e4e3eda0d2fe/export</id>
    <title>a9c74ca4-1056-4ab5-b8b3-e4e3eda0d2fe</title>
    <updated>2026-05-09T09:49:03.245888+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "a9c74ca4-1056-4ab5-b8b3-e4e3eda0d2fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-43444", "type": "seen", "source": "https://t.me/cvedetector/4106", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43444 - OTRS Administration Log Module Plain Text Password Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43444 \nPublished : Aug. 26, 2024, 9:15 a.m. | 37\u00a0minutes ago \nDescription : Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.  \n  \nThis issue affects:   \n  \n  *  OTRS from 7.0.X through 7.0.50  \n  *  OTRS 8.0.X  \n  *  OTRS 2023.X  \n  *  OTRS from 2024.X through 2024.5.X  \n  *  ((OTRS)) Community Edition: 6.0.x  \n  \nProducts based on the ((OTRS)) Community Edition also very likely to be affected \nSeverity: 8.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-26T12:02:12.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/a9c74ca4-1056-4ab5-b8b3-e4e3eda0d2fe/export"/>
    <published>2024-08-26T12:02:12+00:00</published>
  </entry>
</feed>
